Leveraging Flawed Tutorials for Seeding {Large-Scale} Web Vulnerability Discovery

T Unruh, B Shastry, M Skoruppa, F Maggi… - 11th USENIX Workshop …, 2017 - usenix.org
The Web is replete with tutorial-style content on how to accomplish programming tasks.
Unfortunately, even top-ranked tutorials suffer from severe security vulnerabilities, such as …

Validating security protocols with cloud-based middleboxes

CR Taylor, CA Shue - 2016 IEEE Conference on …, 2016 - ieeexplore.ieee.org
Residential networks pose a unique challenge for security since they are operated by end-
users that may not have security expertise. Residential networks are also home to devices …

[PDF][PDF] Poster: Precise detection of unprecedented python cryptographic misuses using on-demand analysis

M Frantz, Y Xiao, TS Pias… - The Network and …, 2022 - ndss-symposium.org
While many research studies target Java cryptographic API misuses, similar issues within
the Python landscape are still uncovered. In this work, we provide 1) security guarantees for …

ML-FEED: Machine Learning Framework for Efficient Exploit Detection

T Saha, T Al Rahat, N Aaraj, Y Tian… - 2022 IEEE 4th …, 2022 - ieeexplore.ieee.org
Machine learning (ML)-based methods have recently become attractive for detecting
security vulnerability exploits. Unfortunately, state-of-the-art ML models like long short-term …

[PDF][PDF] Cerberus: Query-driven Scalable Security Checking for OAuth Service Provider Implementations

T Rahat, Y Feng, Y Tian - 29th ACM Conference on Computer and …, 2022 - par.nsf.gov
OAuth protocols have been widely adopted to simplify user authentication and service
authorization for third-party applications. However, little effort has been devoted to …

Detecting proper SSL/TLS implementation with usage patterns

J Adeenze-Kangah, Y Chen - Journal of Physics: Conference …, 2019 - iopscience.iop.org
The importance of secure communication over the Internet cannot be overstated because of
the implications it has for ensuring privacy and safety for users. Much research has been …

Comparative study on DOS attacks Detection Techniques in SIP-based VOIP networks

R Safoine, S Mounir, A Farchi - 2018 6th International …, 2018 - ieeexplore.ieee.org
Thanks to the low cost of communication provided by Voice over Internet Protocol (VoIP)
networks, the use of VoIP services has significantly increased. Session Initiation Protocol …

Improving application security through TLS-library redesign

LS Amour, WM Petullo - … Conference on Security, Privacy, and Applied …, 2015 - Springer
Research has revealed a number of pitfalls inherent in contemporary TLS libraries. Common
mistakes when programming using their APIs include insufficient certificate verification and …

All your credentials are belong to us: On insecure wpa2-enterprise configurations

MH Hue, J Debnath, KM Leung, L Li, M Minaei… - Proceedings of the …, 2021 - dl.acm.org
In this paper, we perform the first multifaceted measurement study to investigate the
widespread insecure practices employed by tertiary education institutes (TEIs) around the …

Towards best secure coding practice for implementing SSL/TLS

M Alhanahnah, Q Yan - IEEE INFOCOM 2018-IEEE Conference …, 2018 - ieeexplore.ieee.org
Developers often make mistakes while incorporating SSL/TLS functionality in their
applications due to the complication in implementing SSL/TLS and their fast prototyping …